Literature Survey on Privacy Preserving Cross Domain Optimization Algorithms

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-30 Number-2
Year of Publication : 2015
Authors : Anju A P, Dr. K Sasi Kala Rani


Anju A P, Dr. K Sasi Kala Rani "Literature Survey on Privacy Preserving Cross Domain Optimization Algorithms". International Journal of Computer Trends and Technology (IJCTT) V30(2):108-112, December 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
Protecting domain information in the large scale cross domain network is an important thing. The existing methods are either slow or limited in the number of domains. To know more about the problems suffering in the protection of information included many papers related to cross domain network privacy preserving. The algorithms used to protect the information in the cross domain networks have some limitations in some aspects like efficiency, security, response time, scalability, processing time. The first algorithm is Privacy Preserving Quantification of Network Reachability. The network reachability is one of the main concerns in the capturing of end to end behavior of the network and identifying the violation of policies of security. This protocol creates access control list rules and determines network reachability. The second algorithm is Secure Multi-party computation (SMPC) based interdomain routing. Interdomain routing involves coordination among other parties. To rectify the problems with BGP approach, the new method is used. The other algorithm is Pohlig- Hellman Commutative Encryption Algorithm. This protocol is used to remove redundancy in rules. The next algorithm is PYCRO. This is very efficient but it considers only limited domains. Here introduced the details of these algorithms which are used for the privacy preserving of cross domain network.

[1] Fei Chen, Bezawadw Brahadeshwar and Alex X.Liu ,”Privacy-Preserving Cross-Domain Network Reachability Quantification”.
[2] Debayan Gupta, Aaron Segal, Scott Shenker, Aurojit Panda, Gil Segev, Michael Schapira, Joan Feigenbaum, Jenifer Rexford, “A New Approach to Interdomain Routing Based on Secure Multi-Party Computation”.
[3] Rutuja P Shirbhate, Prof.S.D Babar,”Cross-Domain Privacy- PreservingCooperative Firewall Optimization”.
[4]Yogita Nikhare, Prof.Anil Bende,”An Approach for Firewall Optimization in Cross-Domain by Cooperative and Secrecy_Preserving Manner.”
[5]Qingjun Chen,Chen Qian, Shengzhong,” Privacy-Preserving Cross-Domain Routing Optimization-A Cryptographic Approach”.
[6] K.Phemium, M.Bouet and J. Leguay, “DISCO: Distributed Multidomain SDN Controllers”. CoRR,abs/13.8.6138,2013.
[7] S. Schmid and J. Suomela, “Exploiting locality in distributed SDN Control. In Proc. Of ACM HotSDN, 2013.
[8] M. Djatmiko et al.”Federated flow based approach for privacy preserving connectivity tracking”, In CONEXT,2013.
[9] Leucio ,Refik, Sofia et al “Safe book: A privacy preserving online social network leveraging on real life trust”
[10] Stephen, Jukka et al “Exploiting Locality inDistributed SDN control”
[11] Malathi M, Suresh R “Statistical analysis of Interfirewall optimization”
[12] Karim and Gene “Privacy preserving Location Based on Demand Routing in MANETs” IEEE Journal on communication , December 2011.
[13] Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEEE, 2009.
[14] Al-Karaki, J.N.; Kamal, A.E., "Routing techniques in wireless sensor networks: a survey," Wireless Communications, IEEE, vol.11, no.6, pp.6,28,Dec.2004 doi: 10.1109/MWC.2004.1368893
[15] .Gayathri Devi, M.Raja Kumar. "Security to Wireless Sensor Networks with Network Capacity and Network Lifetime Requirement"International Journal of Computer Trends and Technology (IJCTT),V1(3):250-252 July to Aug Issue 2011 .ISSN Published by Seventh Sense Research Group.

privacy preserving, cross domain network, optimization.